Progress in Cryptology – INDOCRYPT 2006: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 4329 : Security and Cryptology

ISBN: 3540497676, 9783540497677

Size: 4 MB (4162165 bytes)

Pages: 458/465

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

James L. Massey (auth.), Rana Barua, Tanja Lange (eds.)3540497676, 9783540497677

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006.

The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 186 submissions. The papers are organized in topical sections on symmetric cryptography: attacks, hash functions, provable security: key agreement, provable security: public key cryptograpy, symmetric cryptography: design, modes of operation and message authentication codes, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.


Table of contents :
Front Matter….Pages –
Whither Cryptography?….Pages 1-1
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4….Pages 2-16
Differential and Rectangle Attacks on Reduced-Round SHACAL-1….Pages 17-31
Algebraic Attacks on Clock-Controlled Cascade Ciphers….Pages 32-47
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication….Pages 48-62
Update on Tiger….Pages 63-79
RC4-Hash: A New Hash Function Based on RC4….Pages 80-94
Security of VSH in the Real World….Pages 95-103
Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols….Pages 104-117
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols….Pages 118-132
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols….Pages 133-147
Another Look at “Provable Security”. II….Pages 148-175
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions….Pages 176-190
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures….Pages 191-205
Conditionally Verifiable Signature….Pages 206-220
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission….Pages 221-235
Using Wiedemann’s Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks….Pages 236-250
Enciphering with Arbitrary Small Finite Domains….Pages 251-265
Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240….Pages 266-279
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation….Pages 280-286
HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach….Pages 287-302
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function….Pages 303-316
A Simple and Unified Method of Proving Indistinguishability….Pages 317-334
Extended Double-Base Number System with Applications to Elliptic Curve Cryptography….Pages 335-348
CMSS – An Improved Merkle Signature Scheme….Pages 349-363
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature….Pages 364-378
Secure Cryptographic Workflow in the Standard Model….Pages 379-393
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext….Pages 394-408
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction….Pages 409-423
AES Software Implementations on ARM7TDMI….Pages 424-435
Galois LFSR, Embedded Devices and Side Channel Weaknesses….Pages 436-451
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Progress in Cryptology – INDOCRYPT 2006: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings”
Shopping Cart
Scroll to Top